WEBSAND
Server-driven Outbound Web-application Sandboxing

Since its birth in 1990, the Web has evolved from a simple, stateless delivery mechanism for static hypertext documents to a fully-edged run-time environment for distributed, multi-party applications. Security becomes increasingly important in this context, but is typically only an afterthought in this process. The next wave, the Future Internet, will continue to rely on the same web application technology, while adopting more p2p and mashup-style approaches. Today's server-centric solutions will give way to a rich and stateful client-centric paradigm with even less manageable security and even more severe threats to the web-based economy of the Future Internet. Data and services from multiple heterogeneous domains, aggregated both on the server-side and on an end-user's client, demand for a novel, comprehensive security solution that increases the user's trust into the technological infrastructure.
WebSand tackles this demand by departing from the observation that security should be server-driven. Even though security preferences from end-users at the client-side have to be taken into account, only the service developers at the server-side have the necessary expertise and context information to define the policies to be enforced. Moreover, server-driven security can be deployed relatively easily, since much can be achieved without updating the client-side platform.
Main WebSand Objectives
In the course of WebSand, a framework is developed that consists of four major building blocks:
- a secure interaction model, that allows explicit and fine-grained control concerning incoming Web communication,
- methods for secure end-to-end information flow control, to enforce confidentiality and integrity properties,
- behavioral sandbox environments for secure client-side and server-side composition of multi-origin components, and
- a declarative and expressive policy description mechanism that ties the individual components together into a unified security architecture spanning client and server.
Role of Uni Passau in WebSand
Our chair
- leads the work package on secure interaction models (WP2),
- contributes to the requirements of the WebSand policy language,
- leads the activities concerning integrity requirements of intended control flow and the development of the central enforcement mechanism,
- participates in the enforcement of information-flow policies, with particular focus on synergy between server-side and client-side enforcement,
- explores code rewriting techniques, and
- hosts and maintains the the central integration lab.
Project Members
- Prof. Dr. Joachim Posegga
- Dr. Bastian Braun
- Prof. Dr. Martin Johns
- Benedikt Petschkuhn
Contact
Project-related publications
2015 | |
![]() | LogSec: Adaptive Protection for the Wild Wild Web the 2015 ACM Symposium on Applied Computing (SAC 2015) - to appear 2015 |
2014 | |
A Trusted UI for the Mobile Web 29th IFIP International Information Security and Privacy Conference (IFIP SEC 2014) 2014 | |
Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications 29th IFIP International Information Security and Privacy Conference (IFIP SEC 2014) 2014 | |
PhishSafe: Leveraging Modern JavaScript API's for Transparent and Robust Protection Fourth ACM Conference on Data and Application Security and Privacy (ACM CODASPY 2014) 2014 | |
2013 | |
A Survey on Control-Flow Integrity Means in Web Application Frameworks 18th Nordic Conference on Secure IT Systems (NordSec 2013) 2013 | |
Control-Flow Integrity in Web Applications International Symposium on Engineering Secure Software and Systems (ESSoS 2013) Publisher: Lecture Notes in Computer Science (LNCS), Springer, 2013 | |
2012 | |
Angriffe auf OpenID und ihre strafrechtliche Bewertung Datenschutz und Datensicherheit - DuD, 36:502-509 2012 ISSN: 1614-0702 | |
A User-Level Authentication Scheme to Mitigate Web Session-Based Vulnerabilities Trust, Privacy and Security in Digital Business (TrustBus '12) , page 17-29. Publisher: Lecture Notes in Computer Science (LNCS), Springer, 2012 Institute of IT-Security and Security Law (ISL), University of Passau, Germany ISBN: 978-3-642-32286-0 | |
BetterAuth: Web Authentication Revisited Proceedings of the 2012 Annual Computer Security Applications Conference (ACSAC 2012) 2012 | |
2011 | |
Reliable Protection Against Session Fixation Attacks Proceedings of the 2011 ACM Symposium on Applied Computing (SAC 2011) , page 1531--1537. Publisher: ACM, TaiChung, Taiwan 2011 ISBN: 978-1-4503-0113-8 | |
2010 | |
Session Fixation - the Forgotten Vulnerability? Sicherheit 2010: Sicherheit, Schutz und Zuverlässigkeit , page 341-352. Publisher: Lecture Notes in Informatics (LNI), Springer, 2010 ISBN: 978-3-88579-264-2 |